An Autoethnography of Pole Dancing, Nudity and Censorship on Instagram

Total Page:16

File Type:pdf, Size:1020Kb

An Autoethnography of Pole Dancing, Nudity and Censorship on Instagram City Research Online City, University of London Institutional Repository Citation: Are, C. ORCID: 0000-0003-1110-3155 (2021). The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram. Feminist Media Studies, doi: 10.1080/14680777.2021.1928259 This is the published version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/26268/ Link to published version: https://doi.org/10.1080/14680777.2021.1928259 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] Feminist Media Studies ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/rfms20 The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram Carolina Are To cite this article: Carolina Are (2021): The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram, Feminist Media Studies, DOI: 10.1080/14680777.2021.1928259 To link to this article: https://doi.org/10.1080/14680777.2021.1928259 © 2021 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. Published online: 19 May 2021. Submit your article to this journal Article views: 1502 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=rfms20 FEMINIST MEDIA STUDIES https://doi.org/10.1080/14680777.2021.1928259 The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram Carolina Are Department of Sociology, School of Arts and Social Sciences, City, University of London, London, UK ABSTRACT ARTICLE HISTORY This paper contributes to the social media moderation research Received 25 November 2020 space by examining the still under-researched “shadowban”, Revised 8 April 2021 a form of light and secret censorship targeting what Instagram Accepted 5 May 2021 defines as borderline content, particularly affecting posts depicting KEYWORDS women’s bodies, nudity and sexuality. “Shadowban” is a user- Shadowban; Instagram; generated term given to the platform’s “vaguely inappropriate algorithm bias; pole dance; content” policy, which hides users’ posts from its Explore page, digital activism dramatically reducing their visibility. While research has already focused on algorithmic bias and on social media moderation, there are not, at present, studies on how Instagram’s shadowban works. This autoethnographic exploration of the shadowban pro­ vides insights into how it manifests from a user’s perspective, applying a risk society framework to Instagram’s moderation of pole dancing content to show how the platform’s preventive mea­ sures are affecting user rights. Introduction This article provides one of the first contributions to research on Instagram’s “shadow­ ban”, a user-generated term for the Facebook-owned photo streaming app’s “vaguely inappropriate content” policy, which dramatically reduces posts’ visibility by hiding them from its Explore page without warning (John Constine 2019). Instagram’s moderation of nudity has previously been condemned by artists, perfor­ mers, activists and celebrities after bans of pictures of female but not male nipples, which caused global online and offline protests such as #FreeTheNipple (Tarleton Gillespie 2018; Instagram n.d.b). While following the protests Facebook and Instagram stopped removing breastfeeding and mastectomy pictures (Gillespie 2018), nudity on these platforms con­ tinues to be viewed as problematic, and is moderated through a variety of obscure techniques, such as shadowbans (Susanna Paasonen, Kylie Jarrett and Ben Light 2019; Katrin Tiidenberg and Emily van der Nagel 2020). Techniques similar to shadowbanning have been used in Internet forums since the 1970s, but the term itself seems to have appeared in the early 2000s on the Something Awful website, where in 2001 moderators began to diminish the reach of those joining forums to troll others (Samantha Cole 2018). In 2016, shadowbans became a conservative CONTACT Carolina Are [email protected] City, University of London, London, UK https://www.city.ac.uk/about/people/academics/carolina-are © 2021 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any med­ ium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way. 2 C. ARE conspiracy theory, with the far-right website Breitbart arguing Twitter was shadowban­ ning Republicans to diminish their influence (ibid). Shadowbans are a cross-platform moderation technique implemented by platforms like Twitter—which prevents shadowbanned accounts’ usernames from appearing at search (Liam Stack 2018)—and of TikTok—which allegedly hid black creators from news­ feeds (Trinady Joslin 2020). Given my experience with Instagram censorship and the app’s growing role in self-promotion and user self-expression (Jesselyn Cook 2019, 2020), this paper focuses on Instagram’s shadowban. Throughout 2019 and 2020, Instagram used shadowbans to hide pictures and videos they deemed inappropriate without deleting them, preventing freelancers, artists, sex workers, activists and, largely, women from reaching new audiences and potentially growing their pages (Carolina Are 2019a; Cook 2019, 2020; Sharine Taylor 2019; Mark Zuckerberg 2018). Hiding or removing social media content is, for Gillespie, “akin to censorship”: it limits users’ speech and prevents them from participating on platforms, causing a chilling effect when posting (Gillespie 2018, 177). Informed by an autoethnography of my experience on Instagram and my interviews with their press team, this paper examines Instagram’s censorship of nudity through a world risk society framework. World risk society theory (Ulrich Beck 1992, 2006; Anthony Giddens 1998) is based on the idea that institutions and businesses ineffectively attempt to reduce risks for their citizens or customers by restricting civil liberties. This way, corporations attempt to avoid undesirable events by arbitrarily identifying risks to pre­ vent, increasing the marginalisation of society’s ‘others’ (ibid). This paper will show that, on Instagram, these preventive governance measures result in unfair moderation. Social media moderation research has explored the practice of ‘flagging’ content (Kate Crawford and Tarleton Gillespie 2016) algorithmic bias in moderation (Reuben Binns 2019; Gillespie 2018; Kaye 2019; Paasonen et al. 2019; etc); censorship of sex or sexual content (Tiidenberg and van der Nagel 2020); and the ‘assembling’ of social media moderation and content recommendation processes to perpetuate sexism (Ysabel Gerrard and Helen Thornham 2020). However, research has yet to examine examples of Instagram’s shadowban. While nudity and sexualisation of women are common in advertising and the media (J V. Sparks and Annie Lang 2015), social media offered users the opportunity to portray their sexuality on their own terms, sparking movements and trends that normalised different bodies and sexual practices (Sarah Banet-Weiser 2018; Rachel Cohen et al. 2019). This deviation from mainstream notions of which bodies and activities are deemed acceptable to depict in a public forum nonetheless resulted in platforms limiting nudity and sexual expression to appeal to advertisers (Tarleton Gillespie 2010; Paasonen et al. 2019; Tiidenberg and van der Nagel 2020). Facebook/Instagram’s governance of bodies following this shift has been found to rely on old-fashioned and non-inclusive depictions of bodies: leaked reports showed the company based their Community Standards on advertising guidelines by Victoria’s Secret (Salty 2019) or tried to normate the acceptability of different modes of breast cupping or grabbing (David Gilbert 2020), using standards more akin to sexist advertising (Sparks and Lang 2015) than to the progressive sexual practices showcased by the plat­ forms’ own users. Shadowbans are a key technique through which these standards are implemented. FEMINIST MEDIA STUDIES 3 Instagram reportedly uses light censorship through the shadowban, meaning that if a post is sexually suggestive, but doesn’t depict a sex act, it may not appear in Explore or hashtag pages, seriously impacting creators’ ability to gain new audiences (Are 2019b, 2019c; Constine 2019). Shadowbannable content is what Zuckerberg (2018) defined as “borderline” when he introduced the policies he rolled out across Facebook brands. Borderline content toes the line of acceptability Facebook/Instagram set and results, in their experience, in higher engagement even if people do
Recommended publications
  • Setting the Record Straighter on Shadow Banning
    Setting the Record Straighter on Shadow Banning Erwan Le Merrer, Benoˆıt Morgan, Gilles Tredan,´ Univ Rennes, Inria, CNRS, Irisa IRIT/ENSHEEIT LAAS/CNRS [email protected] [email protected] [email protected] Abstract—Shadow banning consists for an online social net- happens on the OSN side, collecting information about po- work in limiting the visibility of some of its users, without them tential issues is difficult. In this paper, we explore scientific being aware of it. Twitter declares that it does not use such approaches to shed light on Twitter’s alleged shadow banning a practice, sometimes arguing about the occurrence of “bugs” to justify restrictions on some users. This paper is the first to practice. Focusing on this OSN is crucial because of its central address the plausibility of shadow banning on a major online use as a public communication medium, and because potential platform, by adopting both a statistical and a graph topological shadow banning practices were recently commented. approach. Shadow banning and moderation techniques. shadow banning We first conduct an extensive data collection and analysis (SB or banning for short, also known as stealth banning [6]) campaign, gathering occurrences of visibility limitations on user profiles (we crawl more than 2:5 millions of them). In such is an online moderation technique used to ostracise undesired a black-box observation setup, we highlight the salient user user behaviors. In modern OSNs, shadow banning would refer profile features that may explain a banning practice (using to a wide range of techniques that artificially limit the visibility machine learning predictors).
    [Show full text]
  • Reviewed Books
    REVIEWED BOOKS - Inmate Property 6/27/2019 Disclaimer: Publications may be reviewed in accordance with DOC Administrative Code 309.04 Inmate Mail and DOC 309.05 Publications. The list may not include all books due to the volume of publications received. To quickly find a title press the "F" key along with the CTRL and type in a key phrase from the title, click FIND NEXT. TITLE AUTHOR APPROVEDENY REVIEWED EXPLANATION DOC 309.04 4 (c) 8 a Is pornography. Depicts teenage sexuality, nudity, 12 Beast Vol.2 OKAYADO X 12/11/2018 exposed breasts. DOC 309.04 4 (c) 8 a Is pornography. Depicts teenage sexuality, nudity, 12 Beast Vol.3 OKAYADO X 12/11/2018 exposed breasts. Workbook of Magic Donald Tyson X 1/11/2018 SR per Mike Saunders 100 Deadly Skills Survivor Edition Clint Emerson X 5/29/2018 DOC 309.04 4 (c) 8 b, c. b. Poses a threat to the security 100 No-Equipment Workouts Neila Rey X 4/6/2017 WCI DOC 309.04 4 (c) 8 b. b Teaches fighting techniques along with general fitness DOC 309.04 4 (c) 8 b, c. b. Is inconsistent with or poses a threat to the safety, 100 Things You’re Not Supposed to Know Russ Kick X 11/10/2017 WCI treatment or rehabilitative goals of an inmate. 100 Ways to Win a Ten Spot Paul Zenon X 10/21/2016 WRC DOC 309.04 4 (c) 8 b, c. b. Poses a threat to the security 100 Years of Lynchings Ralph Ginzburg X reviewed by agency trainers, deemed historical Brad Graham and 101 Spy Gadgets for the Evil Genuis Kathy McGowan X 12/23/10 WSPF 309.05(2)(B)2 309.04(4)c.8.d.
    [Show full text]
  • Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition
    Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition Arjun Panesar Machine Learning and AI for Healthcare Arjun Panesar Coventry, UK ISBN-13 (pbk): 978-1-4842-6536-9 ISBN-13 (electronic): 978-1-4842-6537-6 https://doi.org/10.1007/978-1-4842-6537-6 Copyright © 2021 by Arjun Panesar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
    [Show full text]
  • Erotic Ambiguities : the Female Nude in Art / 30111 Helen Mcdonald
    1111 2 3 4 5111 EROTIC AMBIGUITIES 6 7 8 9 1011 1 2 3111 Art is always ambiguous. When it involves the female body it can also be erotic. 4 Erotic Ambiguities is a study of how contemporary women artists have recon- 5 ceptualised the figure of the female nude. Helen McDonald shows how, over 6 the past thirty years, artists have employed the idea of ambiguity to dismantle 7 the exclusive, classical ideal enshrined in the figure of the nude, and how they 8 have broadened the scope of the ideal to include differences of race, ethnicity, 9 sexuality and disability as well as gender. 20111 McDonald discusses the work of a wide range of women artists, including 1 Barbara Kruger, Judy Chicago, Mary Duffy, Zoe Leonard, Tracey Moffatt, Pat 2 Brassington and Sally Smart. She traces the shift in feminist art practices from 3 the early challenge to patriarchal representations of the female nude to contem- 4 porary, ‘postfeminist’ practices, influenced by theories of performativity, queer 5 theory and postcoloniality. McDonald argues that feminist efforts to develop 6 a more positive representation of the female body need to be reconsidered, 7 in the face of the resistant ambiguities and hybrid complexities of visual art in 8 the late 1990s. 9 30111 Helen McDonald is an Honorary Fellow in the School of Fine Arts, Classical 1 Studies and Archaeology at the University of Melbourne. 2 3 4 5 6 7 8 9 40111 1 2 3 44111 i RUNNING HEAD 1111 2 3 4 5 6 7 8 9 1011 1 2 3 4 5 6 7 8 9 20111 1 2 3 4 5 6 7 8 9 30111 1 2 3 4 5 6 7 8 9 40111 1 2 3 44111 ii RUNNING HEAD
    [Show full text]
  • Analyzing Twitter Users' Behavior Before and After Contact By
    Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency UPASANA DUTTA, RHETT HANSCOM, JASON SHUO ZHANG, RICHARD HAN, TAMARA 90 LEHMAN, QIN LV, SHIVAKANT MISHRA, University of Colorado Boulder, USA Social media platforms have been exploited to conduct election interference in recent years. In particular, the Russian-backed Internet Research Agency (IRA) has been identified as a key source of misinformation spread on Twitter prior to the 2016 U.S. presidential election. The goal of this research is to understand whether general Twitter users changed their behavior in the year following first contact from an IRA account. We compare the before and after behavior of contacted users to determine whether there were differences in their mean tweet count, the sentiment of their tweets, and the frequency and sentiment of tweets mentioning @realDonaldTrump or @HillaryClinton. Our results indicate that users overall exhibited statistically significant changes in behavior across most of these metrics, and that those users that engaged with the IRA generally showed greater changes in behavior. CCS Concepts: • Applied computing ! Law, social and behavioral sciences; • Human-centered com- puting ! Collaborative and social computing. Additional Key Words and Phrases: Internet Research Agency; IRA; Twitter; Trump; democracy ACM Reference Format: Upasana Dutta, Rhett Hanscom, Jason Shuo Zhang, Richard Han, Tamara Lehman, Qin Lv, Shivakant Mishra. 2021. Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency. Proc. ACM Hum.-Comput. Interact. 5, CSCW1, Article 90 (April 2021), 24 pages. https://doi.org/10.1145/3449164 INTRODUCTION For many years, the growth of online social media has been seen as a tool used to bring people together across borders and time-zones.
    [Show full text]
  • Generating Counter Narratives Against Online Hate Speech: Data and Strategies
    Generating Counter Narratives against Online Hate Speech: Data and Strategies Serra Sinem Tekiroglu˘ 1, Yi-Ling Chung1,2, and Marco Guerini1 1Fondazione Bruno Kessler, Via Sommarive 18, Povo, Trento, Italy [email protected],[email protected],[email protected] 2University of Trento, Italy Abstract the conversations (Bielefeldt et al., 2011; Jurgens et al., 2019). In this line of action, some Non- Recently research has started focusing on avoiding undesired effects that come with Govermental Organizations (NGOs) train operators content moderation, such as censorship and to intervene in online hateful conversations by writ- overblocking, when dealing with hatred on- ing counter-narratives. A Counter-Narrative (CN) line. The core idea is to directly intervene in is a non-aggressive response that offers feedback the discussion with textual responses that are through fact-bound arguments and is considered as meant to counter the hate content and prevent the most effective approach to withstand hate mes- it from further spreading. Accordingly, au- sages (Benesch, 2014; Schieb and Preuss, 2016). tomation strategies, such as natural language generation, are beginning to be investigated. To be effective, a CN should follow guidelines simi- 1 Still, they suffer from the lack of sufficient lar to those in ‘Get the Trolls Out’ project , in order amount of quality data and tend to produce to avoid escalating the hatred in the discussion. generic/repetitive responses. Being aware of Still, manual intervention against hate speech the aforementioned limitations, we present a is not scalable. Therefore, data-driven NLG ap- study on how to collect responses to hate ef- proaches are beginning to be investigated to assist fectively, employing large scale unsupervised language models such as GPT-2 for the gen- NGO operators in writing CNs.
    [Show full text]
  • Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
    COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics.
    [Show full text]
  • Congressional Record—Senate S4658
    S4658 CONGRESSIONAL RECORD — SENATE August 3, 2020 The PRESIDING OFFICER. Without companies censor political viewpoints employ disturbing and familiar im- objection, it is so ordered. that they find objectionable. That was agery. COMMUNICATIONS DECENCY ACT 2 years ago. It has only worsened in the According to the ESPN investiga- Mr. WICKER. Madam President, for 2 years since then. tion, one former league employee com- almost 25 years, the internet has grown These concerns come at a time when pared the atmosphere at the Xinjiang and thrived under the light-touch regu- tech companies wield unprecedented camp to ‘‘World War II Germany.’’ latory framework established by the power within our economy and our cul- An American coach, who worked at a Communications Decency Act. I hope ture at large, and no one can deny that. similar facility, described it as a we can continue that. I think some A bipartisan chorus of committee ‘‘sweat camp for athletes.’’ changes need to be made. members from the other body pointed Now, according to the investigation, Passed in 1996, the law that the Com- this out just last week. More and more almost immediately after the NBA munications Decency Act is a part of of our daily business is taking place launched this program back in 2016, helped create the internet. Section 230 online, and that trend is only accel- multiple coaches who were staffing the of that law gives broad liability protec- erating during the current pandemic. camps reported to high-ranking organi- tions to interactive computer services, As we near the 2020 election, Ameri- zation officials that they had witnessed such as Facebook, Twitter, and other cans have serious concerns about Chinese coaches beating and berating social media platforms.
    [Show full text]
  • Case 2:14-Cv-02100-SRB Document 95-2 Filed 11/04/14 Page 1 of 40
    Case 2:14-cv-02100-SRB Document 95-2 Filed 11/04/14 Page 1 of 40 1 Daniel Pochoda (Bar No. 021979) Joshua S. Akbar (State Bar No. 025339) Victoria Lopez (Bar No. 330042)** DENTONS US LLP 2 ACLU Foundation of Arizona 2398 E. Camelback Road, Suite 850 3707 North 7th Street, Suite 235 Phoenix, AZ 85016-9016 3 Phoenix, AZ 85011-0148 Telephone: (602) 508-3900 Telephone: (602) 650-1854 Email: [email protected] 4 Email: [email protected] vlopez(i:V,acluaz.org Michael A. Bamberger (admitted pro 5 **Admitted pursuant to Ariz. Sup. Ct. R. 38(f) hac vice) Richard M. Zuckerman (admitted pro 6 . Lee Rowland (admitted pro hac vice) hac vice) ACLU Foundation DENTONS US LLP 7 125 Broad Street, 18th Floor 1221 Avenue of the Americas New York, NY 10004 New York, NY I 0020 8 Telephone: (212) 549-2500 Telephone: (212) 768-6700 Email: lrowlandCal.aclu.org Email: 9 [email protected] richard.zuckennan(a),dentons.com 10 Attorneysfor Plaintiffs II IN THE UNITED STATES PISTRICT COURT 12 FOR THE DISTRICT OF ARIZONA 13 ANTIGONE BOOKS L.L.C.; INTERGALACTIC, INC., Case No. DIB/ A, BOOKMANS; CHANGING HANDS 2:14-cv-02100-PHX-SRB 14 BOOKSTORE, INC.; COPPER NEWS BOOK STORE; MOSTLY BOOKS; VOICE MEDIA GROUP, INC.; 15 AMERICAN BOOKSELLERS FOUNDATION FOR FREE DECLARATION OF EXPRESSION; ASSOCIATION OF AMERICAN SEAN FEENEY (BOOKMANS) 16 PUBLISHERS; FREEDOM TO READ FOUNDATION; AND NATIONAL PRESS PHOTOGRAPHERS 17 ASSOCIATION, 18 Plaintiffs, 19 -v- 20 TOM HORNE in his capacity as Attorney General of the State of Arizona, et al., 21 Defendants.
    [Show full text]
  • Netchoice V. Moody
    Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 1 of 48 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF FLORIDA TALLAHASSEE DIVISION NETCHOICE, LLC, et al., Plaintiffs, v. Civil Action No. ASHLEY BROOKE MOODY, in her official 4:21-cv-220- RH-MAF capacity as Attorney General of the State of Florida, et al., Defendants. BRIEF OF INTERNET ASSOCIATION AS AMICUS CURIAE IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Patrick J. Carome (pro hac vice pending) Peter W. Homer (D.C. SBN 385676) (FL SBN 291250) Paul R.Q. Wolfson (pro hac vice pending) HOMER BONNER (D.C. SBN 414759) 1200 Four Seasons Tower Ari Holtzblatt (pro hac vice pending) 1441 Brickell Avenue (D.C. SBN 1009913) Miami, Florida 33131 WILMER CUTLER PICKERING (305) 350-5139 HALE AND DORR LLP 1875 Pennsylvania Avenue, NW Washington, DC 20006 (202) 663-6000 Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 2 of 48 DISCLOSURE STATEMENT OF AMICUS CURIAE INTERNET ASSOCIATION Amicus Curiae Internet Association is not a publicly held corporation, does not have a parent corporation, and has not issued stock. Therefore, no publicly traded corporation owns ten percent or more of its stock. None of the counsel for the parties in this litigation has authored this brief, in whole or in part. Furthermore, no party, party’s counsel, or outside organization has funded the research, writing, preparation, or submission of this brief. /s/ Peter W. Homer Peter W. Homer i Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 3 of 48 TABLE OF CONTENTS Page DISCLOSURE STATEMENT OF AMICUS CURIAE INTERNET ASSOCIATION ...............................................................................................
    [Show full text]
  • 'Please Read the Comments': Commenting Cultures
    Selected Papers of #AoIR2020: st The 21 ​ Annual Conference of the ​ Association of Internet Researchers D u b l i n Virtual, Irela nEventd / 2 8/ - 27-3131 Oc Octobertober 2 0202020 ‘PLEASE READ THE COMMENTS’: COMMENTING CULTURES ACROSS PLATFORMS Crystal Abidin Curtin University Platform-specific commenting cultures An old adage about the internet goes “Don’t Read The Comments”. It is a cynical word of caution from supposedly more experienced and savvy internet users, against a slew of negative, abusive, and unhelpful comments that are usually rampant online, stemming from trolling behaviour (Phillips 2015). “Don’t Read The Comments” has become an internet meme. Alongside parody websites (i.e. @AvoidComments n.d.), trawling through the comments section in search of ludicrosity has become an internet genre in and of itself. This comprises the likes of meme factory ‘The Straits Times Comment Section’ which collates absurd comments from users on a specific newspaper’s Facebook page (STcomments n.d.), as well as internet celebrity troll commentators like ‘American Ken’ M (Know Your Meme n.d.) and Singaporean ‘Peter Tan’ (Yeoh 2018), who post comments on a network of social media and fora in stealthily satirical ways that have even been co-opted for advertorials (Vox 2016). Such vernacular practice has in turn provoked a counter-genre of memes known as “I’m just Here For The Comments” (Tenor n.d.), in which users closely follow social media posts mainly for the resulting discussion and engagement in the comments section rather than the actual post itself. It is on this point of departure that this panel turns its focus to commenting cultures across platforms.
    [Show full text]
  • Oral History Interview with Judy Dater, 2000 June 2
    Oral history interview with Judy Dater, 2000 June 2 Funding for the digital preservation of this interview was provided by a grant from the Save America's Treasures Program of the National Park Service. Contact Information Reference Department Archives of American Art Smithsonian Institution Washington. D.C. 20560 www.aaa.si.edu/askus Transcript Preface The following oral history transcript is the result of a tape-recorded interview with Judy Dater on June 2, 2000. The interview took place in Berkeley, California, and was conducted by Paul Karlstrom for the Archives of American Art, Smithsonian Institution. Interview [TAPE 1, SIDE A] PAUL KARLSTROM: Archives of American Art, Smithsonian Institution. An interview with photographer Judy Dater at her studio residence in Berkeley, California. The theme for this brief and focused interview is Artists and Models. This is one in a series. The date is June 2nd, year 2000. And the interviewer for the Archives is Paul Karlstrom. Having said that, now we can get down to business. We are going to be talking about a very specific subject or theme. What is said about it, of course, remains to be seen. But I’m very interested in your perspective and your own experience regarding this subject. First of all, we’re not talking about all models -- we’re not talking about for the most part professional models. I guess you would call them private models who elect to pose for your photographs or for perhaps paintings and drawings. For some reason other than the fee, $12.00 or whatever it is an hour.
    [Show full text]